Show simple item record

dc.contributor.advisorSelçuk, Ali Aydın
dc.contributor.authorKalkan, Said
dc.date.accessioned2016-01-08T18:06:36Z
dc.date.available2016-01-08T18:06:36Z
dc.date.issued2008
dc.identifier.urihttp://hdl.handle.net/11693/14736
dc.descriptionAnkara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilkent University, 2008.en_US
dc.descriptionThesis (Master's) -- Bilkent University, 2008.en_US
dc.descriptionIncludes bibliographical references leaves 58-62.en_US
dc.description.abstractID-based cryptography helps us to simplify key management process in traditional public key infrastructures. Any public information such as the e-mail address, name, etc., can be used as a public key and this solves the problem of obtaining the public key of a party and checking that its certificate is valid. ID-based cryptography has been a very active area of research in cryptography since bilinear pairings were introduced as a cryptographic tool. There have been many proposals for ID-based signatures recently. In this thesis, we introduce the concept of generalized ID-based ElGamal signatures and show that most of the proposed ID-based signature schemes in the literature are special instances of this generalized scheme. We also investigate ID-based signatures providing additional properties. Signature schemes with message recovery provide the feature that the message is recoverable from the signature and hence does not need to be transmitted separately. Blind signatures provide the feature that a user is able to get a signature without giving the actual message to the signer. Finally, signcryption schemes fulfill the job of a digital signature and encryption in a single step with a lower computational cost. We generalize the ID-based signatures providing these properties and obtain numerous new signatures which have not been explored before. The generalized ID-based signatures we described provide a unified framework for ID-based ElGamal signatures and extensions. Additionally, some of our blind signatures turn out to be more efficient than the previously proposed schemes.en_US
dc.description.statementofresponsibilityKalkan, Saiden_US
dc.format.extentx, 62 leavesen_US
dc.language.isoEnglishen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectID-Based Signatureen_US
dc.subjectBlindnessen_US
dc.subjectMessage Recoveryen_US
dc.subjectSigncryptionen_US
dc.subject.lccTK5105.59 .K35 2008en_US
dc.subject.lcshComputer networks--Security measures.en_US
dc.subject.lcshComputer security.en_US
dc.subject.lcshDigital signatures.en_US
dc.titleGeneralized ID-based elgamal signatures and extensionsen_US
dc.typeThesisen_US
dc.departmentDepartment of Computer Engineeringen_US
dc.publisherBilkent Universityen_US
dc.description.degreeM.S.en_US
dc.identifier.itemidBILKUTUPB109254


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record